Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp9524881rwl; Wed, 11 Jan 2023 06:50:17 -0800 (PST) X-Google-Smtp-Source: AMrXdXtgWa4nS1UIRxJ42YyitUu/NnDwXy6YT1e+fP6bNrxN7X5VS2xH6dDaMxxp9GTdod5qHHFs X-Received: by 2002:a05:6a20:6da9:b0:b5:d0e7:bea5 with SMTP id gl41-20020a056a206da900b000b5d0e7bea5mr3002912pzb.26.1673448617068; Wed, 11 Jan 2023 06:50:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673448617; cv=none; d=google.com; s=arc-20160816; b=klpD+brdFqC4KVDtY7g/GKTLeL0X7BlIm/mULAfVYpevFB2dQwUFEIEHaBuHKZqyko Avxu5ZPFlqvL43ol3fKU8iAovB2Wg0UzYaVLABitJF3QHBZHYvZbDvsWBGAFgWr00UMc I+v5dRhkcYcYnNF3eOfQSBJijSmGyCRKsNFJMdNswdX7vB+T30DqcHSFKE7VQwHceD5a WvUCZkNeBJVUUb+JJpE6HB5TTG6f3ts0mnzKRc6zCJo+XkYiWwB4X5SV3Y7C79nqQDDj 6sXhD3jwOTiLnDYtAbUXDt2o/OB86Ib8ZCWFW6rk55UKlFfGJi6UEL6TMlysIDT0MUNQ rfww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-signature; bh=Oz0qOP2ZOsRcmGjluW9mY/IkUju29ZUJcXEHrHbI1sc=; b=ReWq9BYIko3pIAXo+eFXmEBIpGFd4OYyGiwJO96yeuLo+OU/rlZa+/UoV6tT1wH3up CAEhG+ver5hD5HCnqGze93mxiZZQCNR+Io6pzv1RQRKrTCLeSls05NaCOmGzyWbAFlTG 6sXerPk/BeWswjg5An1RRl91eevJcSwffk1a0vGDB8zvB5jB12/28Eq2BoSc2L+KH8rs 3RYHhdfldwZNb8aNXU8xJgkeSwWuzETiVw7HUmjtRAYO/9vmDzEvHUjt/UM0AH5FJw9L AXdLBgnAYLTT0nXdwM9KOoxQD8QusD6Dilmeym+uQkIMMICYoNmz/1pl2d2VsOs/FCKR QK7w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=F6gesJs+; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519 header.b=nqj559TX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lp11-20020a17090b4a8b00b00218b76cda10si15012371pjb.0.2023.01.11.06.50.10; Wed, 11 Jan 2023 06:50:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=F6gesJs+; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519 header.b=nqj559TX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232662AbjAKOFd (ORCPT + 53 others); Wed, 11 Jan 2023 09:05:33 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51254 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232967AbjAKOFa (ORCPT ); Wed, 11 Jan 2023 09:05:30 -0500 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 70DC8E0D1 for ; Wed, 11 Jan 2023 06:05:29 -0800 (PST) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id D8D2D17B3E; Wed, 11 Jan 2023 14:05:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1673445927; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Oz0qOP2ZOsRcmGjluW9mY/IkUju29ZUJcXEHrHbI1sc=; b=F6gesJs+xlvfSRe2yogwSAZhgfx62fMAulInnbN9fYBDYYwHYcVvTCF1IEloZOu6Y9fza8 ujTHxqa8sU5H4cfbO74AQcaAZse3vCsYNeGJVpKQo/Ru9E4CBWX84ZEu+Yu2l7IzVB3zd+ BqScBQo+TiLj3UTAEWEhwR4e7/nnHUA= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1673445927; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Oz0qOP2ZOsRcmGjluW9mY/IkUju29ZUJcXEHrHbI1sc=; b=nqj559TXnwjJhsVVeJHg7PtOVGnWpYV2ebqvw6EtTJoQJO/1g5i+WaT2YDQnEoxrKpZklS WLZKtaeAMkCc1PAQ== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id B947F1358A; Wed, 11 Jan 2023 14:05:27 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id EQiRLCfCvmNfAwAAMHmgww (envelope-from ); Wed, 11 Jan 2023 14:05:27 +0000 Message-ID: <1eca7836-2e90-0ed8-7556-fa6be057aad2@suse.cz> Date: Wed, 11 Jan 2023 15:05:27 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.6.1 Subject: Re: [PATCH 5/7] mm/page_alloc.c: Allow __GFP_NOFAIL requests deeper access to reserves Content-Language: en-US To: Mel Gorman , Linux-MM Cc: Andrew Morton , Michal Hocko , NeilBrown , Thierry Reding , Matthew Wilcox , LKML References: <20230109151631.24923-1-mgorman@techsingularity.net> <20230109151631.24923-6-mgorman@techsingularity.net> From: Vlastimil Babka In-Reply-To: <20230109151631.24923-6-mgorman@techsingularity.net> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/9/23 16:16, Mel Gorman wrote: > Currently __GFP_NOFAIL allocations without any other flags can access 25% > of the reserves but these requests imply that the system cannot make forward > progress until the allocation succeeds. Allow __GFP_NOFAIL access to 75% > of the min reserve. > > Signed-off-by: Mel Gorman Acked-by: Vlastimil Babka > --- > mm/page_alloc.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/mm/page_alloc.c b/mm/page_alloc.c > index 6f41b84a97ac..d2df78f5baa2 100644 > --- a/mm/page_alloc.c > +++ b/mm/page_alloc.c > @@ -5308,7 +5308,7 @@ __alloc_pages_slowpath(gfp_t gfp_mask, unsigned int order, > * could deplete whole memory reserves which would just make > * the situation worse > */ > - page = __alloc_pages_cpuset_fallback(gfp_mask, order, ALLOC_HARDER, ac); > + page = __alloc_pages_cpuset_fallback(gfp_mask, order, ALLOC_MIN_RESERVE|ALLOC_HARDER, ac); > if (page) > goto got_pg; >